Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Kent Borg wrote: > I don't think that passes DoD requirements either. The drill press? It certainly does for non-classified media. Classified media requires a thorough degaussing optionally followed by physical destruction. Incineration is also an option for classified media. Incineration is also acceptable for flash media. Repeat statement about how flash-based media are consumables. > But I don't need to make the DoD happy, I just need to destroy the > encryption key. And all I -- for some value of "I" which may not be myself -- have to do is find a way to recover that key which, depending on [insert everything about potential weaknesses in algorithms and schedulers and not-really-random number generators here] may not be that difficult. Depends on your threat model. Or you could use RAM-based SSDs instead of flash. Almost instant sanitizing when power is removed. -- Rich P.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |